Scientists create fully electronic 2-dimensional spin transistors

Physicists have constructed a two-dimensional spin transistor, in which spin currents were generated by an electric current through graphene. A monolayer of a transition metal dichalcogenide (TMD) was placed on top of graphene to induce charge-to-spin conversion in the graphene.

Read more

New method for detecting quantum states of electrons

Researchers have devised a new method — called image charge detection — to detect electrons' transitions to quantum states. Electrons can serve as quantum bits, the smallest unit of quantum information; these bits are foundational to larger computational systems. Quantum computers may be used to understand the mechanism of superconductivity, cryptography, artificial intelligence, among other applications.

Read more

Using smart sensor technology in building design

In today's world, spaces with motion and temperature 'smart sensors' are common and generally improve our overall well-being. However, research indicated that while the information and technology exists to assist architects in designing structures that offer more efficient space and energy management, they seldom take advantage of those available resources.

Read more

300 shades of gray: a look into free mobile VPN apps

Credit to Author: Jovi Umawing| Date: Tue, 10 Sep 2019 16:41:45 +0000

Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.

Categories:

Tags:

(Read more…)

The post 300 shades of gray: a look into free mobile VPN apps appeared first on Malwarebytes Labs.

Read more

5 simple steps to securing your remote employees

Credit to Author: David Ruiz| Date: Wed, 04 Sep 2019 14:06:26 +0000

Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.

Categories:

Tags:

(Read more…)

The post 5 simple steps to securing your remote employees appeared first on Malwarebytes Labs.

Read more

MegaCortex Returns…

Credit to Author: Shriram Munde| Date: Tue, 30 Jul 2019 07:27:12 +0000

MegaCortex, a ransomware which was first spotted in January this year, has become active again and has changed the way it previously attacked/targeted the corporate world. In order to simplify its execution and increase its scale of operation, it uses ‘Command Prompt’ instead of ‘PowerShell’ in current targeted campaign. Key…

Read more

Data and device security for domestic abuse survivors

Credit to Author: David Ruiz| Date: Tue, 13 Aug 2019 16:33:22 +0000

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Categories:

Tags:

(Read more…)

The post Data and device security for domestic abuse survivors appeared first on Malwarebytes Labs.

Read more

Backdoors are a security vulnerability

Credit to Author: David Ruiz| Date: Fri, 09 Aug 2019 16:10:27 +0000

Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.

Categories:

Tags:

(Read more…)

The post Backdoors are a security vulnerability appeared first on Malwarebytes Labs.

Read more